Cyber Security News

New Sophisticated Linux Backdoor Targets OT Systems via 0-Day RCE Exploit

Researchers at QiAnXin XLab have uncovered a sophisticated Linux-based backdoor dubbed OrpaCrab, specifically targeting industrial systems associated with ORPAK, a company involved in gas stations and oil transportation.

The malware, which was uploaded to VirusTotal in January 2024 from the U.S., employs advanced techniques to evade detection and maintain persistence on compromised systems.

Exploitation of MQTT Protocol for Covert C2 Communication

One of OrpaCrab’s notable features is its utilization of the MQTT (Message Queuing Telemetry Transport) protocol for command and control (C2) communication.

This approach allows the malware to blend its traffic with legitimate MQTT communications, making it challenging for security teams to detect malicious activity.

The backdoor establishes persistence through a script that autostart from “/etc/rc3.d/” and employs AES-256-CBC encryption to obfuscate its configuration information.

Furthermore, OrpaCrab leverages DNS over HTTPS (DoH) to resolve its C2 domain, effectively bypassing traditional DNS monitoring techniques.

Potential Link to CyberAv3ngers Hacking Group

Claroty researchers, who independently analyzed the malware and codenamed it IOCONTROL, reported that it was extracted from a Gasboy fuel management system previously compromised by the CyberAv3ngers hacking group.

This group has been linked to cyberattacks exploiting Unitronics PLCs to breach water systems, suggesting a potential expansion of their targeting to include fuel infrastructure.

The malware’s presence within Gasboy’s Payment Terminal (OrPT) implies that the threat actors had the capability to control payment systems, potentially enabling them to disrupt fuel services and steal customer credit card information.

The discovery of OrpaCrab highlights the evolving threat landscape for operational technology (OT) systems, particularly in critical infrastructure sectors.

The malware’s sophisticated design, including its use of MQTT for C2 communications and its ability to target specific industrial systems, demonstrates the increasing complexity of attacks against OT environments.

This incident serves as a stark reminder for organizations in the energy and transportation sectors to enhance their cybersecurity measures, particularly focusing on securing communication protocols and implementing robust monitoring systems capable of detecting anomalous behavior in industrial control systems.

Are you from SOC/DFIR Teams? – Analyse Malware, Phishing Incidents & get live Access with ANY.RUN -> Start Now for Free.

Aman Mishra

Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Recent Posts

Gamaredon Hackers Weaponize LNK Files to Deliver Remcos Backdoor

Cisco Talos has uncovered an ongoing cyber campaign by the Gamaredon threat actor group, targeting…

18 hours ago

“Crocodilus” A New Malware Targeting Android Devices for Full Takeover

Researchers have uncovered a dangerous new mobile banking Trojan dubbed Crocodilus actively targeting financial institutions…

18 hours ago

SquareX Discloses Browser-Native Ransomware that Puts Millions at Risk

From WannaCry to the MGM Resorts Hack, ransomware remains one of the most damaging cyberthreats…

2 days ago

Hackers Exploit DNS MX Records to Create Fake Logins Imitating 100+ Brands

Cybersecurity researchers have discovered a sophisticated phishing-as-a-service (PhaaS) platform, dubbed "Morphing Meerkat," that leverages DNS…

2 days ago

New Python-Based Discord RAT Targets Users to Steal Login Credentials

A recently identified Remote Access Trojan (RAT) has raised alarms within the cybersecurity community due…

2 days ago

PJobRAT Android Malware Masquerades as Dating and Messaging Apps to Target Military Personnel

PJobRAT, an Android Remote Access Trojan (RAT) first identified in 2019, has resurfaced in a…

2 days ago